ITU-T X.1381 PDF

ITU-T X.1381 PDF

Name:
ITU-T X.1381 PDF

Published Date:
03/01/2023

Status:
[ Active ]

Description:

Security guidelines for Ethernet-based in-vehicle networks

Publisher:
International Telecommunication Union-T

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$12.3
Need Help?

This Recommendation provides security guidelines for Ethernet-based in-vehicle networks (IVNs). It covers:

1) security threat analysis;

2) security requirements; and

3) use cases,

from a cyber-security perspective. Cybersecurity indicates that the technical communication architecture concerned is or can be an integral part of cyber-physical systems (e.g., Ethernet communication protocol stacks integrated in embedded systems).

Applicability statements

Networks in general and those on the Ethernet in particular are used for communication services. The security context in this Recommendation consequently focuses on communication security, but not necessarily on information security as such for compute nodes with Ethernet connectivity.

The security guidelines in this Recommendation therefore cover network engineering of Ethernet-based networks as used in automotive applications, from the security engineering perspective. Thus, the associated layered communication architectures with their layered protocol stacks are a fundamental part of such security considerations.

Validation of security guidelines over the timeline

Security for communication architectures as required for in-vehicle Ethernet networks is fundamentally evolving, primarily due to

1) possible changes in network topologies (driven by the evolving distributed computing architectures, using that communication networks, e.g., in direction of vehicle automation);

2) layered protocol architectures: current Ethernet and non-Ethernet protocol stacks in use can change, get extensions, etc.;

3) protocol evolution: current information and communication technology (ICT) protocols (as owned by standards development organizations like IEEE, IETF, ITU-T, ETSI, 3GPP) in use are still subject to ongoing maintenance activities and extensions, reflected by protocol profiling (e.g., IEEE time-sensitive networking (TSN) for automotive applications) [b-IEEE 1722-2016] or protocol versioning;

NOTE – Further, protocol specification-associated security considerations may be also subject to update.

1) evolution of security means and solutions in the context of communication security.

Future revisions of this Recommendation are therefore expected.

This Recommendation focuses in particular on initial security guidelines, given by a first set of use cases. The primary scope is first generation(s) Ethernet-based IVNs, leading to best current security practices and security guidelines at the time of publication of this Recommendation.


Edition : 23#
File Size : 1 file
Number of Pages : 38
Published : 03/01/2023

History


Related products

ITU-T G.723.1 ANNEX B
Published Date: 11/01/1996
Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s Annex B: Alternative Specification Based on Floating Point Arithmetic - Series G: Transmission Systems and Media Digital Transmission Systems - Terminal Equipments - Coding of Analogue Signals by Methods Other Than PCM
$5.7
ITU-T K.116
Published Date: 07/01/2019
Electromagnetic compatibility requirements and test methods for radio telecommunication terminal equipment
$12.3
ITU-T SERIES Q SUPP 5
Published Date: 03/01/1999
Number Portability - Capability Set 2 Requirements for Service Provider Portability (Query on Release and Dropback) - Series Q: Switching and Signalling
$12.3

Best-Selling Products

ASIS ORM.1-2017
Published Date: 06/19/2017
Security and Resilience in Organizations and their Supply Chains - Requirements with Guidance
$57.9